Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
JISEC-CC-CRP-C0514
Xerox WorkCentre 7328/7335/7345 Version: Controller+PS ROM Ver.1.221.100 IOT ROM Ver.3.0.4 IIT ROM Ver.20.4.1 ADF ROM Ver.11.6.5
JISEC-CC-CRP-C0137
name Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z) Xerox WorkCentre 7328/7335/7345 Version: Controller+PS ROM Ver.1.221.100 IOT ROM Ver.3.0.4 IIT ROM Ver.20.4.1 ADF ROM Ver.11.6.5
category Access Control Devices and Systems Multi-Function Devices
not_valid_after 06.06.2021 17.01.2013
not_valid_before 06.06.2016 26.12.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0137_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0137_st.pdf
manufacturer Hitachi, Ltd. Fuji Xerox Co., Ltd.
manufacturer_web https://www.hitachi.com/ https://www.fujixerox.co.jp/eng/
security_level EAL2+, ALC_FLR.1 EAL2
dgst 4b794daffbae517d 4525da4808394317
heuristics/cert_id JISEC-CC-CRP-C0514 JISEC-CC-CRP-C0137
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1
heuristics/extracted_versions 25, 01, 80, 00 3.0.4, 20.4.1, 11.6.5, 1.221.100
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0514
  • certification_date: 01.06.2016
  • claim: EAL2+ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0514_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
    • product_type: Control Program for storage system
    • report_link: https://www.ipa.go.jp/en/security/c0514_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0514_est.pdf
    • toe_version: 80-01-25-00/00(R8-01A-06_Z)
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.07.2021
  • supplier: Hitachi, Ltd.
  • toe_japan_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html
  • toe_overseas_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z)
  • cert_id: JISEC-CC-CRP-C0137
  • certification_date: 01.12.2007
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0137_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE provides copy, print, scan, and fax functions as basic functions. The TOE is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are linked to the TOE via internal network, and general user client which is directly linked to the TOE. TOE security functions To ensure the security of assets to be protected, the TOE provides the following functions regarding the above basic functions: - Hard Disk Data Overwrite - Hard Disk Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - FAX Flow Security
    • evaluation_facility: Information Technology Security Center
    • product: Xerox WorkCentre 7328/7335/7345
    • product_type: IT Product (Multi Function Peripheral)
    • report_link: https://www.ipa.go.jp/en/security/c0137_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0137_est.pdf
    • toe_version: Controller+PS ROM Ver.1.221.100 IOT ROM Ver.3.0.4 IIT ROM Ver.20.4.1 ADF ROM Ver.11.6.5
    • vendor: Fuji Xerox Co., Ltd.
  • expiration_date: 01.03.2013
  • supplier: Fuji Xerox Co., Ltd.
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0137_it7159.html
  • toe_overseas_name: Xerox WorkCentre 7328/7335/7345 Controller+PS ROM Ver.1.221.100 IOT ROM Ver.3.0.4 IIT ROM Ver.20.4.1 ADF ROM Ver.11.6.5
pdf_data/report_filename c0514_erpt.pdf c0137_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0514-01: 1
    • Certification No. C0514: 1
  • JP:
    • CRP-C0137-01: 1
    • Certification No. C0137: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
  • EAL:
    • EAL2: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.CONNECT_STORAGE: 1
    • A.EXTERNAL_SERVER: 1
    • A.MAINTENCE_PC: 1
    • A.MANAGEMENT_PC: 1
    • A.MANAGE_SECRET: 1
    • A.NOEVIL: 1
    • A.PHYSICAL_SEC: 1
  • T:
    • T.CHG_CONFIG: 1
    • T.HDD_REUSE: 1
    • T.HDD_THEFT: 1
    • T.LP_LEAK: 1
    • T.TSF_COMP: 1
  • A:
    • A.ADMIN: 1
    • A.SECMODE: 1
  • T:
    • T.COMM_TAP: 1
    • T.CONFDATA: 1
    • T.CONSUME: 1
    • T.DATA_SEC: 1
    • T.RECOVER: 1
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 8
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_metadata
  • /CreationDate: D:20160906162354+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160906162432+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 473024
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 41
  • /CreationDate: D:20080208135447+09'00'
  • /ModDate: D:20080208135447+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 175898
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 26
pdf_data/st_filename c0514_est.pdf c0137_st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 3
  • EAL:
    • EAL 2: 2
    • EAL2: 8
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_CAP.2: 6
  • ADO:
    • ADO_DEL.1: 7
    • ADO_IGS.1: 7
  • ADV:
    • ADV_FSP.1: 13
    • ADV_HLD.1: 6
    • ADV_RCR.1: 7
  • AGD:
    • AGD_ADM.1: 8
    • AGD_USR.1: 7
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 6
    • ATE_IND.2: 5
  • AVA:
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 18
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 10
    • FAU_STG.3.1: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 2
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 19
    • FIA_ATD.1: 6
    • FIA_SOS: 20
    • FIA_SOS.1: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 18
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 18
    • FIA_UID.2.1: 1
    • FIA_USB: 19
    • FIA_USB.1: 6
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 10
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 1
    • FPT_STM.1: 13
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 9
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 17
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 13
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 15
    • FAU_SAR.2.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 14
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 13
  • FCS:
    • FCS_CKM.1: 18
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 4
    • FCS_COP.1: 16
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 12
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_RIP.1: 13
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 28
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 4
    • FIA_UAU.2: 23
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 17
    • FIA_UAU.7.1: 1
    • FIA_UIA.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 10
    • FIA_UID.2: 21
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 27
    • FMT_MOF.1.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 13
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 4
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_RVM.1: 48
    • FPT_RVM.1.1: 1
    • FPT_STM.1: 15
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECT_STORAGE: 3
    • A.EXTERNAL_SERVER: 3
    • A.MAINTENANCE_PC: 3
    • A.MANAGEMENT_PC: 3
    • A.MANAGE_SECRET: 3
    • A.NOEVIL: 3
    • A.PHYSICAL_SEC: 3
  • O:
    • O.ADM_AUTH: 8
    • O.ADM_ROLE: 5
    • O.AUD_GEN: 7
    • O.HDD_: 2
    • O.HDD_ENC: 6
    • O.HDD_SHRED: 3
    • O.HOST_ACCESS: 8
    • O.SEC_COMM: 8
    • O.SWITCH_AUTH: 6
  • OE:
    • OE.CONNECT_STORAGE: 2
    • OE.EXTERNAL_SERVER: 3
    • OE.FC-: 1
    • OE.FC-SP_HBA: 2
    • OE.HDD_ENC: 2
    • OE.MAINTENANCE_PC: 3
    • OE.MANAGEMENT_PC: 2
    • OE.MANAGE_SECRET: 3
    • OE.NOEVIL: 2
    • OE.PHYSICAL_SEC: 3
  • T:
    • T.CHG_CONFIG: 3
    • T.HDD_REUSE: 3
    • T.HDD_THEFT: 3
    • T.LP_LEAK: 3
    • T.TSF_COMP: 3
  • A:
    • A.ADMIN: 4
    • A.SECMODE: 3
  • O:
    • O.AUDITS: 10
    • O.CIPHER: 7
    • O.COMM_SEC: 8
    • O.FAX_SEC: 6
    • O.MANAGE: 10
    • O.RESIDUAL: 7
    • O.RESTRICT: 8
    • O.USER: 8
  • OE:
    • OE.ADMIN: 4
    • OE.AUTH: 8
    • OE.COMMS_SEC: 6
    • OE.FUNCTION: 8
  • T:
    • T.COMM_TAP: 4
    • T.CONFDATA: 3
    • T.CONSUME: 4
    • T.DATA_SEC: 3
    • T.RECOVER: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 1
  • AES_competition:
    • AES:
      • AES: 4
    • RC:
      • RC2: 1
      • RC4: 1
    • Rijndael:
      • Rijndael: 1
  • DES:
    • 3DES:
      • Triple-DES: 3
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 512: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA1:
      • SHA-1: 10
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 8
    • TLS:
      • TLS: 2
      • TLSv1.0: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
pdf_data/st_keywords/side_channel_analysis
  • other:
    • cold boot: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS PUB 180-2: 1
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 1
  • RFC:
    • RFC2865: 2
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408: 4
  • RFC:
    • RFC 2104: 1
    • RFC3414: 1
  • X509:
    • X.509: 2
pdf_data/st_metadata
  • /Author: 八木
  • /CreationDate: D:20160901154400+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160901154400+09'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: CC EAL2 Security Target
  • /Title: USP_V ST
  • pdf_file_size_bytes: 1477873
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
  • /CreationDate: D:20080205111549+09'00'
  • /ModDate: D:20080205111549+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 1164197
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 85
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different